Search preferences
Ir a los resultados principales

Filtros de búsqueda

Tipo de artículo

  • Todos los tipos de productos 
  • Libros (11)
  • Revistas y publicaciones (No hay ningún otro resultado que coincida con este filtro.)
  • Cómics (No hay ningún otro resultado que coincida con este filtro.)
  • Partituras (No hay ningún otro resultado que coincida con este filtro.)
  • Arte, grabados y pósters (No hay ningún otro resultado que coincida con este filtro.)
  • Fotografías (No hay ningún otro resultado que coincida con este filtro.)
  • Mapas (No hay ningún otro resultado que coincida con este filtro.)
  • Manuscritos y coleccionismo de papel (No hay ningún otro resultado que coincida con este filtro.)

Condición Más información

  • Nuevo (10)
  • Como nuevo, Excelente o Muy bueno (No hay ningún otro resultado que coincida con este filtro.)
  • Bueno o Aceptable (No hay ningún otro resultado que coincida con este filtro.)
  • Regular o Pobre (No hay ningún otro resultado que coincida con este filtro.)
  • Tal como se indica (1)

Encuadernación

Más atributos

  • Primera edición (No hay ningún otro resultado que coincida con este filtro.)
  • Firmado (No hay ningún otro resultado que coincida con este filtro.)
  • Sobrecubierta (No hay ningún otro resultado que coincida con este filtro.)
  • Con imágenes (7)
  • No impresión bajo demanda (7)

Idioma (1)

Precio

Intervalo de precios personalizado (EUR)

Ubicación del vendedor

  • Rehman, Aasia

    Publicado por Grin Verlag, 2019

    ISBN 10: 3668943400 ISBN 13: 9783668943407

    Idioma: Inglés

    Librería: California Books, Miami, FL, Estados Unidos de America

    Calificación del vendedor: 5 de 5 estrellas Valoración 5 estrellas, Más información sobre las valoraciones de los vendedores

    Contactar al vendedor

    EUR 59,27

    Gastos de envío gratis
    Ships within Estados Unidos de America

    Cantidad disponible: Más de 20 disponibles

    Añadir al carrito

    Condición: New.

  • Rehman, Aasia

    Publicado por LAP LAMBERT Academic Publishing, 2019

    ISBN 10: 6139459710 ISBN 13: 9786139459711

    Idioma: Inglés

    Librería: Revaluation Books, Exeter, Reino Unido

    Calificación del vendedor: 5 de 5 estrellas Valoración 5 estrellas, Más información sobre las valoraciones de los vendedores

    Contactar al vendedor

    EUR 97,04

    EUR 11,44 shipping
    Ships from Reino Unido to Estados Unidos de America

    Cantidad disponible: 1 disponibles

    Añadir al carrito

    Paperback. Condición: Brand New. 92 pages. 8.66x5.91x0.21 inches. In Stock.

  • Aasia Rehman

    Publicado por GRIN Verlag, GRIN Verlag Mai 2019, 2019

    ISBN 10: 3668943400 ISBN 13: 9783668943407

    Idioma: Inglés

    Librería: buchversandmimpf2000, Emtmannsberg, BAYE, Alemania

    Calificación del vendedor: 5 de 5 estrellas Valoración 5 estrellas, Más información sobre las valoraciones de los vendedores

    Contactar al vendedor

    EUR 47,95

    EUR 60,00 shipping
    Ships from Alemania to Estados Unidos de America

    Cantidad disponible: 2 disponibles

    Añadir al carrito

    Taschenbuch. Condición: Neu. Neuware -Master's Thesis from the year 2017 in the subject Computer Science - General, grade: 8.63, , course: M. Tech - Cognitive Radio Networks, language: English, abstract: Cognitive Radio Network (CRN) Technology makes the efficient utilization of scarce spectrum resources by allowing the unlicensed users to opportunistically use the licensed spectrum bands. Cognitive Radio Technology has gained a lot of attention from the researchers over the years however insufficient research has been done related to its security. Cognitive Radio Network due to its flexible and open nature is vulnerable to a number of security attacks. In this thesis we recognize different types of attacks at different layers of protocol stack. This thesis is mainly concerned with one of the physical layer attack called Primary User Emulation Attack and its detection. PUE Attack adversely affects the CRN performance and can also sometimes lead to Denial of Service to CR networks. In Primary User Emulation Attack the attacker imitates the signal characteristics of the Primary User. This thesis first provides introduction to CRN, its architecture and sensing techniques and also discusses various attacks and their counter measures. Then it mainly focuses on PUE attack and examines its mitigation techniques. This thesis solves the problem of PUE attack by localization technique based on TDOA measurements with reduced error in location estimation using a Novel Bat Algorithm (NBA). A number of cooperative secondary users are used for detecting the PUEA by comparing its estimated position with the known position of incumbent. The main goal of Novel Bat Algorithm (NBA) is to minimize two fitness functions namely non-linear least square (NLS) and the maximum likelihood (ML) in order to optimize the error in estimation. After evaluation, simulation results clearly demonstrates that NBA results in reduced estimation error as compared to Taylor Series Estimation (TSE) and Particle Swarm Optimization (PSO) and it also needs smaller number of secondary users for cooperation. Also maximum likelihood function performs better than non-linear least square function.BoD - Books on Demand, In de Tarpen 42, 22848 Norderstedt 88 pp. Englisch.

  • Aasia Rehman

    Publicado por GRIN Verlag, 2019

    ISBN 10: 3668943400 ISBN 13: 9783668943407

    Idioma: Inglés

    Librería: AHA-BUCH GmbH, Einbeck, Alemania

    Calificación del vendedor: 5 de 5 estrellas Valoración 5 estrellas, Más información sobre las valoraciones de los vendedores

    Contactar al vendedor

    EUR 47,95

    EUR 60,73 shipping
    Ships from Alemania to Estados Unidos de America

    Cantidad disponible: 1 disponibles

    Añadir al carrito

    Taschenbuch. Condición: Neu. Druck auf Anfrage Neuware - Printed after ordering - Master's Thesis from the year 2017 in the subject Computer Science - General, grade: 8.63, , course: M. Tech - Cognitive Radio Networks, language: English, abstract: Cognitive Radio Network (CRN) Technology makes the efficient utilization of scarce spectrum resources by allowing the unlicensed users to opportunistically use the licensed spectrum bands. Cognitive Radio Technology has gained a lot of attention from the researchers over the years however insufficient research has been done related to its security. Cognitive Radio Network due to its flexible and open nature is vulnerable to a number of security attacks. In this thesis we recognize different types of attacks at different layers of protocol stack. This thesis is mainly concerned with one of the physical layer attack called Primary User Emulation Attack and its detection. PUE Attack adversely affects the CRN performance and can also sometimes lead to Denial of Service to CR networks. In Primary User Emulation Attack the attacker imitates the signal characteristics of the Primary User. This thesis first provides introduction to CRN, its architecture and sensing techniques and also discusses various attacks and their counter measures. Then it mainly focuses on PUE attack and examines its mitigation techniques. This thesis solves the problem of PUE attack by localization technique based on TDOA measurements with reduced error in location estimation using a Novel Bat Algorithm (NBA). A number of cooperative secondary users are used for detecting the PUEA by comparing its estimated position with the known position of incumbent. The main goal of Novel Bat Algorithm (NBA) is to minimize two fitness functions namely non-linear least square (NLS) and the maximum likelihood (ML) in order to optimize the error in estimation.After evaluation, simulation results clearly demonstrates that NBA results in reduced estimation error as compared to Taylor Series Estimation (TSE) and Particle Swarm Optimization (PSO) and it also needs smaller number of secondary users for cooperation. Also maximum likelihood function performs better than non-linear least square function.

  • Aasia Rehman

    Publicado por LAP LAMBERT Academic Publishing Mär 2019, 2019

    ISBN 10: 6139459710 ISBN 13: 9786139459711

    Idioma: Inglés

    Librería: buchversandmimpf2000, Emtmannsberg, BAYE, Alemania

    Calificación del vendedor: 5 de 5 estrellas Valoración 5 estrellas, Más información sobre las valoraciones de los vendedores

    Contactar al vendedor

    EUR 54,90

    EUR 60,00 shipping
    Ships from Alemania to Estados Unidos de America

    Cantidad disponible: 2 disponibles

    Añadir al carrito

    Taschenbuch. Condición: Neu. Neuware -In this work we recognize di¿erent types of attacks at di¿erent layers of protocol stack. This thesis is mainly concerned with one of the physical layer attack called Primary User Emulation Attack and its detection. PUE Attack adversely äects the CRN performance and can also sometimes lead to Denial of Service to CR networks. In Primary User Emulation Attack the attacker imitates the signal characteristics of the Primary User. This thesis ¿rst provides introduction to CRN, its architecture and sensing techniques and also discusses various attacks and their counter measures. Then it mainly focuses on PUE attack and examines its mitigation techniques. This thesis solves the problem of PUE attack by localization technique based on TDOA measurements with reduced error in location estimation using a Novel Bat Algorithm (NBA).Books on Demand GmbH, Überseering 33, 22297 Hamburg 92 pp. Englisch.

  • Aasia Rehman

    Publicado por LAP LAMBERT Academic Publishing, 2019

    ISBN 10: 6139459710 ISBN 13: 9786139459711

    Idioma: Inglés

    Librería: Buchpark, Trebbin, Alemania

    Calificación del vendedor: 5 de 5 estrellas Valoración 5 estrellas, Más información sobre las valoraciones de los vendedores

    Contactar al vendedor

    Oportunidad

    EUR 25,41

    EUR 105,00 shipping
    Ships from Alemania to Estados Unidos de America

    Cantidad disponible: 1 disponibles

    Añadir al carrito

    Condición: Hervorragend. Zustand: Hervorragend | Sprache: Englisch | Produktart: Bücher | In this work we recognize di¿erent types of attacks at di¿erent layers of protocol stack. This thesis is mainly concerned with one of the physical layer attack called Primary User Emulation Attack and its detection. PUE Attack adversely äects the CRN performance and can also sometimes lead to Denial of Service to CR networks. In Primary User Emulation Attack the attacker imitates the signal characteristics of the Primary User. This thesis ¿rst provides introduction to CRN, its architecture and sensing techniques and also discusses various attacks and their counter measures. Then it mainly focuses on PUE attack and examines its mitigation techniques. This thesis solves the problem of PUE attack by localization technique based on TDOA measurements with reduced error in location estimation using a Novel Bat Algorithm (NBA).

  • Rehman, Aasia

    Publicado por LAP LAMBERT Academic Publishing, 2019

    ISBN 10: 6139459710 ISBN 13: 9786139459711

    Idioma: Inglés

    Librería: Mispah books, Redhill, SURRE, Reino Unido

    Calificación del vendedor: 4 de 5 estrellas Valoración 4 estrellas, Más información sobre las valoraciones de los vendedores

    Contactar al vendedor

    EUR 167,39

    EUR 28,61 shipping
    Ships from Reino Unido to Estados Unidos de America

    Cantidad disponible: 1 disponibles

    Añadir al carrito

    paperback. Condición: New. NEW. SHIPS FROM MULTIPLE LOCATIONS. book.

  • Aasia Rehman

    Publicado por GRIN Verlag Mai 2019, 2019

    ISBN 10: 3668943400 ISBN 13: 9783668943407

    Idioma: Inglés

    Librería: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Alemania

    Calificación del vendedor: 5 de 5 estrellas Valoración 5 estrellas, Más información sobre las valoraciones de los vendedores

    Contactar al vendedor

    Impresión bajo demanda

    EUR 47,95

    EUR 23,00 shipping
    Ships from Alemania to Estados Unidos de America

    Cantidad disponible: 2 disponibles

    Añadir al carrito

    Taschenbuch. Condición: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -Master's Thesis from the year 2017 in the subject Computer Science - General, grade: 8.63, , course: M. Tech - Cognitive Radio Networks, language: English, abstract: Cognitive Radio Network (CRN) Technology makes the efficient utilization of scarce spectrum resources by allowing the unlicensed users to opportunistically use the licensed spectrum bands. Cognitive Radio Technology has gained a lot of attention from the researchers over the years however insufficient research has been done related to its security. Cognitive Radio Network due to its flexible and open nature is vulnerable to a number of security attacks. In this thesis we recognize different types of attacks at different layers of protocol stack. This thesis is mainly concerned with one of the physical layer attack called Primary User Emulation Attack and its detection. PUE Attack adversely affects the CRN performance and can also sometimes lead to Denial of Service to CR networks. In Primary User Emulation Attack the attacker imitates the signal characteristics of the Primary User. This thesis first provides introduction to CRN, its architecture and sensing techniques and also discusses various attacks and their counter measures. Then it mainly focuses on PUE attack and examines its mitigation techniques. This thesis solves the problem of PUE attack by localization technique based on TDOA measurements with reduced error in location estimation using a Novel Bat Algorithm (NBA). A number of cooperative secondary users are used for detecting the PUEA by comparing its estimated position with the known position of incumbent. The main goal of Novel Bat Algorithm (NBA) is to minimize two fitness functions namely non-linear least square (NLS) and the maximum likelihood (ML) in order to optimize the error in estimation.After evaluation, simulation results clearly demonstrates that NBA results in reduced estimation error as compared to Taylor Series Estimation (TSE) and Particle Swarm Optimization (PSO) and it also needs smaller number of secondary users for cooperation. Also maximum likelihood function performs better than non-linear least square function. 92 pp. Englisch.

  • Aasia Rehman

    Publicado por LAP LAMBERT Academic Publishing Mrz 2019, 2019

    ISBN 10: 6139459710 ISBN 13: 9786139459711

    Idioma: Inglés

    Librería: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Alemania

    Calificación del vendedor: 5 de 5 estrellas Valoración 5 estrellas, Más información sobre las valoraciones de los vendedores

    Contactar al vendedor

    Impresión bajo demanda

    EUR 54,90

    EUR 23,00 shipping
    Ships from Alemania to Estados Unidos de America

    Cantidad disponible: 2 disponibles

    Añadir al carrito

    Taschenbuch. Condición: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -In this work we recognize di erent types of attacks at di erent layers of protocol stack. This thesis is mainly concerned with one of the physical layer attack called Primary User Emulation Attack and its detection. PUE Attack adversely a ects the CRN performance and can also sometimes lead to Denial of Service to CR networks. In Primary User Emulation Attack the attacker imitates the signal characteristics of the Primary User. This thesis first provides introduction to CRN, its architecture and sensing techniques and also discusses various attacks and their counter measures. Then it mainly focuses on PUE attack and examines its mitigation techniques. This thesis solves the problem of PUE attack by localization technique based on TDOA measurements with reduced error in location estimation using a Novel Bat Algorithm (NBA). 92 pp. Englisch.

  • Aasia Rehman

    Publicado por LAP LAMBERT Academic Publishing, 2019

    ISBN 10: 6139459710 ISBN 13: 9786139459711

    Idioma: Inglés

    Librería: moluna, Greven, Alemania

    Calificación del vendedor: 4 de 5 estrellas Valoración 4 estrellas, Más información sobre las valoraciones de los vendedores

    Contactar al vendedor

    Impresión bajo demanda

    EUR 45,45

    EUR 48,99 shipping
    Ships from Alemania to Estados Unidos de America

    Cantidad disponible: Más de 20 disponibles

    Añadir al carrito

    Condición: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Autor/Autorin: Rehman AasiaThe author is pursuing PhD in Computer Science at University of Kashmir, Srinagar. She has been awarded M.Tech in CSE from Shri Mata Vaishno Devi University, Jammu and B.Tech in CSE from University of Kashmir, Srinagar.

  • Aasia Rehman

    Publicado por LAP LAMBERT Academic Publishing, 2019

    ISBN 10: 6139459710 ISBN 13: 9786139459711

    Idioma: Inglés

    Librería: AHA-BUCH GmbH, Einbeck, Alemania

    Calificación del vendedor: 5 de 5 estrellas Valoración 5 estrellas, Más información sobre las valoraciones de los vendedores

    Contactar al vendedor

    Impresión bajo demanda

    EUR 55,56

    EUR 60,78 shipping
    Ships from Alemania to Estados Unidos de America

    Cantidad disponible: 1 disponibles

    Añadir al carrito

    Taschenbuch. Condición: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - In this work we recognize di erent types of attacks at di erent layers of protocol stack. This thesis is mainly concerned with one of the physical layer attack called Primary User Emulation Attack and its detection. PUE Attack adversely a ects the CRN performance and can also sometimes lead to Denial of Service to CR networks. In Primary User Emulation Attack the attacker imitates the signal characteristics of the Primary User. This thesis first provides introduction to CRN, its architecture and sensing techniques and also discusses various attacks and their counter measures. Then it mainly focuses on PUE attack and examines its mitigation techniques. This thesis solves the problem of PUE attack by localization technique based on TDOA measurements with reduced error in location estimation using a Novel Bat Algorithm (NBA).